An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST requests your comments on Draft SP 800-133 Revision 2, Recommendation for Cryptographic Key Generation , which discusses the generation of the keys to be
A draft revision of NISTIR 8183, the Cybersecurity Framework (CSF) Manufacturing Profile, has been developed that includes the subcategory enhancements
Partnerships to Build the Cybersecurity Workforce The National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology
Partnerships to Build the Cybersecurity Workforce The National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology
NIST Special Publication 800-171, Revision 2, Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations, has been approved as
6th ANNUAL NICE K12 Cybersecurity Education Conference SAVE THE DATE: December 7-8, 2020 LOCATION: St. Louis, Missouri Visit the Conference Website We are
At this year's RSA Conference in San Francisco, CA, NIST staff will be hosting a number of presentations, interactive meetings, demos, and panels. The following
11th ANNUAL NICE CONFERENCE AND EXPO SAVE THE DATE: November 16-18, 2020 LOCATION: Atlanta, Georgia Visit the Conference website We are excited to announce that
Rodney Petersen, the Director of the National Initiative for Cybersecurity Education (NICE), participated as a witness during the House Science Subcommittee on
The number of Common Vulnerabilities and Exposures identifiers (CVE IDs) created year over year has rapidly increased, and this trend is expected to continue
Reducing the cybersecurity risk to one of the most vulnerable aspects of commerce — global supply chains — is the goal of a new publication by the National
Since NIST Special Publication (SP) 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, was published in 2015
NIST requests feedback on Draft NISTIR 8276, Key Practices in Cyber Supply Chain Risk Management: Observations from industry. This publication is based on an
Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts
In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References
As microservices-based applications are increasingly adopted within large enterprises and cloud-based environments, there is a need for a dedicated, scalable
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results
Federal agencies, under the Federal Information Security Modernization Act of 2014 (FISMA) and Office of Management and Budget (OMB) circulars and memoranda
The Winter 2019-20 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
An incredible variety and volume of Internet of Things (IoT) devices are being produced. Manufacturers can help their customers by improving how securable the
How accurately do face recognition software tools identify people of varied sex, age and racial background? According to a new study by the National Institute
New biometric research data — ranging from fingerprints to facial photographs and iris scans — is now available from the National Institute of Standards and
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature
The United States continues to have complete dependence on information technology deployed in critical systems and applications in both the public and private